Internet lacks of strong security mechanisms, opening the way to a plethora of different manners in which integrity and availability can be compromised by malicious activities. Furthermore, the trend shows an increase of security threats, at least in the foreseeable future. Despite such situation, new proposals for Future Internet architectures mostly aiming at solving scalability issues do rather neglect security aspects. Among candidate Future Internet architectures, the ones based on the Locator/Identifier separation paradigm has been largely explored, but security had no major role in these research activities. We present a security threats analysis of such approach using the Locator/Identifier Separation Protocol (LISP) as a running ex...
During the last decade, we have seen the rise of discussions regarding the emergence of a Future Int...
Internet Draft IETFdraft-ietf-lisp-threatsThis document proposes a threat analysis of the Locator/Id...
International audience<p>The Internet was designed to interconnect a few hundreds networks, but now ...
<p>Internet lacks of strong security mechanisms, opening the way to a plethora of different manners ...
International audienceThe chapter does not overview the merits of the Locator/Identifier separation ...
Part 8: Next Generation InternetInternational audienceDue to scalability issues that the current Int...
The motivation behind the Locator/Identifier Separation Protocol (LISP) has shifted over time from r...
During the last decades, Internet has evolved from host-centric toinformation-centric in the sense t...
Abstract—Network security has become an essential business requirement over the past few years. As t...
The Internet has been created for interconnecting few hundreds networks, but is now close to one bil...
International audienceDuring the last decade, we have seen the rise of discussions regarding the eme...
This document provides a threat analysis of the Locator/ID Separation Protocol (LISP)
Abstract. In the Internet, IP addresses play the dual role of identifying the hosts and locating the...
The Internet evolved from its early days of being a small research network to become a critical infr...
During the last few years, the network research community and the industry have been working on the ...
During the last decade, we have seen the rise of discussions regarding the emergence of a Future Int...
Internet Draft IETFdraft-ietf-lisp-threatsThis document proposes a threat analysis of the Locator/Id...
International audience<p>The Internet was designed to interconnect a few hundreds networks, but now ...
<p>Internet lacks of strong security mechanisms, opening the way to a plethora of different manners ...
International audienceThe chapter does not overview the merits of the Locator/Identifier separation ...
Part 8: Next Generation InternetInternational audienceDue to scalability issues that the current Int...
The motivation behind the Locator/Identifier Separation Protocol (LISP) has shifted over time from r...
During the last decades, Internet has evolved from host-centric toinformation-centric in the sense t...
Abstract—Network security has become an essential business requirement over the past few years. As t...
The Internet has been created for interconnecting few hundreds networks, but is now close to one bil...
International audienceDuring the last decade, we have seen the rise of discussions regarding the eme...
This document provides a threat analysis of the Locator/ID Separation Protocol (LISP)
Abstract. In the Internet, IP addresses play the dual role of identifying the hosts and locating the...
The Internet evolved from its early days of being a small research network to become a critical infr...
During the last few years, the network research community and the industry have been working on the ...
During the last decade, we have seen the rise of discussions regarding the emergence of a Future Int...
Internet Draft IETFdraft-ietf-lisp-threatsThis document proposes a threat analysis of the Locator/Id...
International audience<p>The Internet was designed to interconnect a few hundreds networks, but now ...